Tenant Administrator Guide: Managing Tenant Settings¶
This guide provides comprehensive instructions for tenant administrators on managing tenant settings through the Auth service UI.
Table of Contents¶
- Overview
- Accessing Tenant Settings
- Tenant Menu Options
- Dashboard
- Expiring Items
- Settings (Edit Tenant Dialog)
- System Notifications
- Login Metrics
- Usage Report
- Edit Tenant Dialog - Tab Reference
- Settings Tab
- Branding Tab
- Login Page Tab
- Landing Page Tab
- Allowed Origins Tab
- User Alert Settings Tab
- Email Settings Tab
- Tenant SAML Certificates Tab
- Tenant JWKS Key Set Tab
- Cookie Consent Banner Tab
- Contacts Tab
- Security Recommendations
Overview¶
As a tenant administrator, you have comprehensive control over your tenant's authentication and authorization settings, branding, and user experience. This guide covers all configuration options available through the Auth UI.
Note: Some features may be restricted to super administrators only, or may require elevated admin scopes. These restrictions are noted throughout this guide.
Accessing Tenant Settings¶
- Log in to the Auth UI
- Select your tenant from the tenant dropdown in the top navigation
- Navigate to the Tenant section in the left navigation menu
- Select the desired option from the submenu
The Tenant menu includes:
- Dashboard
- Expiring Items
- Settings
- System Notifications
- Login Metrics
- Usage Report
Tenant Menu Options¶
Dashboard¶
Location: Tenant > Dashboard
Purpose: Provides an overview of your tenant's current status and key metrics.
What you can do:
- View tenant summary information
- Monitor key statistics
- Access quick links to common tasks
Expiring Items¶
Location: Tenant > Expiring Items
Purpose: Monitor items that are approaching expiration to ensure continuity of service.
What you can monitor:
- Expiring certificates (SAML, X.509)
- Expiring access grants
- Other time-sensitive configurations
Best practice: Review this page regularly to avoid service disruptions from expired credentials.
Settings (Edit Tenant Dialog)¶
Location: Tenant > Settings
Purpose: Comprehensive tenant configuration via a multi-tab dialog.
Click the Edit button on the Tenant Details page to open the tenant settings dialog, which contains 11 configuration tabs (detailed below).
System Notifications¶
Location: Tenant > System Notifications
Purpose: Manage tenant-wide system notifications displayed to users.
What you can do:
- Create system-wide notifications
- Schedule notification display periods
- Configure notification visibility
Security note: Creating global (cross-tenant) notifications requires super admin privileges.
Login Metrics¶
Location: Tenant > Login Metrics
Purpose: View real-time and historical login metrics powered by Grafana.
What you can see:
- Login success/failure rates
- Authentication method usage
- Geographic distribution of logins
- Time-series charts and trends
Use case: Monitor for unusual authentication patterns that may indicate security issues.
Usage Report¶
Location: Tenant > Usage Report
Purpose: View detailed usage statistics for your tenant's SSO integrations.
What you can see:
- Active users per application
- Authentication volume by client
- Identity provider usage
- Session statistics
Use case: Optimize your SSO configuration based on actual usage patterns.
Edit Tenant Dialog - Tab Reference¶
Access the Edit Tenant dialog by navigating to Tenant > Settings and clicking the Edit button.
Settings Tab¶
Purpose: Configure core tenant properties and session management.
Basic Information¶
- Display Name* (required)
- The human-readable name shown to users
- Must contain at least one alphabetic character
-
Used in UI displays and user-facing communications
-
Name
- The tenant's unique identifier (tenantId)
- Read-only after creation
-
Maximum 50 characters
-
ID
- Internal numeric identifier
-
Read-only (automatically assigned)
-
Description* (required)
- Detailed description of the tenant's purpose
- Maximum 1024 characters
-
Helpful for documenting tenant usage
-
Visibility
Public: Tenant is searchable by anonymous usersPrivate: Tenant is hidden from public tenant lists-
Security recommendation: Use
Privatefor production tenants unless public discovery is required -
Logo
- Upload a custom logo for your tenant
- Displayed in the tenant selector and branding elements
- Supported formats: PNG, JPEG, SVG
Session Management¶
- Session Lifetime (seconds)
- Overall maximum session duration
- Default: 3600 seconds (1 hour)
- Controls the absolute maximum time a user can remain authenticated
-
Security recommendation: Set based on your security requirements; shorter is more secure
-
Idle Session Lifetime (seconds)
- Timeout duration for inactive sessions
- Minimum: 120 seconds (2 minutes)
- Default: 1200 seconds (20 minutes)
- Triggers automatic logout after period of inactivity
-
Security note: Users receive a warning 5 minutes before expiration (or 1 minute for sessions ≤5 minutes)
-
Refresh Token Lifetime (minutes)
- How long refresh tokens remain valid
- Default: 20,160 minutes (14 days)
-
Allows users to obtain new access tokens without re-authenticating
-
Time Zone
- Tenant's default timezone for timestamps and scheduling
- Used in audit logs, expiration calculations, and UI displays
Security Features¶
- Enable Admin MFA
- Enforces multi-factor authentication for all tenant admins and system admins
- Security recommendation: Always enable for production tenants
-
Applies tenant-wide to all users with admin privileges
-
Always Require MFA When Set
- Enforces MFA for all users who have already configured it
- Applies to all clients in the tenant
-
Use case: Enforce consistent MFA usage after initial opt-in period
-
Enable TOTP Reset Requests
- Enables the TOTP reset request workflow
- Allows users to request assistance with lost TOTP devices
-
Exposes TOTP reset endpoints and login features
-
TOTP Reset Link Expiry (minutes)
- How long TOTP reset links remain valid
- Default: 15 minutes
-
Only visible when TOTP reset is enabled
-
TOTP Strike Count
- Maximum failed TOTP attempts before account lockout
- Default: 5 attempts
-
Security recommendation: Keep at 3-5 attempts
-
TOTP Lockout Period (minutes)
- Duration of account lockout after exceeding strike count
- Default: 2 minutes
- Security note: Protects against brute-force attacks
Advanced Features¶
- Enable Command Terminal
- Enables the web-based CLI terminal feature
- Availability: Only shown if configured at the platform level
-
Security note: Grants direct CLI access; use with caution
-
User Supplied Attributes
- Define custom user attributes that clients can request
- Configured as JSON array with validation rules
- Format:
Audit Log Retention Settings¶
- Enable Custom trimByDate Trim Job Settings
- Customize audit log retention by age
-
Age Limit (days): Number of days to retain audit logs
-
Enable Custom trimBySize Trim Job Settings
- Customize audit log retention by volume
- Check Number: Number of records to evaluate
- Trim Ratio: Proportion of records to remove when threshold is reached (0.0 to 1.0)
Security recommendation: Balance compliance requirements with storage costs; retain audit logs for at least 90 days for most compliance frameworks.
Branding Tab¶
Purpose: Customize the visual appearance of your tenant's authentication pages and email communications.
Availability: Requires tenant admin or super admin privileges.
Tenant Icon¶
- Purpose: Logo displayed in tenant selector and branding elements
- Supported formats: PNG, JPEG, SVG
- Recommended size: 200x200 pixels minimum for optimal quality
- Preview: Live preview shows how the icon will appear
Email Branding¶
Configure the appearance of system-generated emails sent to users.
- Email Header Background Color
- Background color for email header section
- Default:
#01336f(blue) -
Visual color picker with live preview
-
Email Header Text Color
- Text color for email header
- Default:
#ffffff(white) -
Ensure sufficient contrast with header background
-
Email Body Text Color
- Color for email body text
-
Default:
#333333(dark gray) -
Font Family
- Typography for email content
- Default:
Roboto, Helvetica, Arial, sans-serif -
Options: System font stacks for cross-client compatibility
-
Font Size
- Base font size for email content
-
Default:
14px -
Email Header Title
- Title text displayed in email header
- Default:
Single Sign-On System Message -
Maximum: 100 characters
-
Email Template Logo (Super Admins Only)
- Modify the logo used in email templates
- Restriction: Only super administrators can edit system logo
- Separate from tenant icon
Email Preview: Live preview pane shows how emails will appear with current settings.
Best practices:
- Test emails after changing branding settings
- Ensure colors meet WCAG accessibility guidelines (4.5:1 contrast ratio minimum)
- Use your organization's brand colors for consistency
Login Page Tab¶
Purpose: Customize the login page appearance and behavior.
Availability: Requires auth.clients.list or auth.clients.update scope (or tenant admin bypass).
Background and Panels¶
- Background Images
- Upload one or more background images for login page rotation
- Supports multiple images for variety
-
Recommended size: Full HD (1920x1080) or higher
-
Panel Banner
- Image displayed at the top of the login panel
- Single image selection
-
Use case: Organization logo or branding header
-
Footer
- Image displayed in the login page footer
- Single image selection
- Use case: Partner logos, compliance badges
Disclaimer Settings¶
- Enable Disclaimer
- Displays a mandatory acceptance dialog before login
-
Use case: Terms of service, acceptable use policies
-
Disclaimer Text
- Content of the disclaimer message
- Maximum: 4000 characters
-
Supports plain text
-
Disclaimer Expiration Days
- How often users must re-accept the disclaimer
- Compliance note: Some regulations require periodic re-acceptance
Page Text Customization¶
- Title
- Main heading displayed on the login page
-
Example: "Welcome to [Organization] SSO"
-
Description
- Subheading or descriptive text
-
Example: "Sign in with your organizational credentials"
-
Login Options Title
- Text shown above identity provider buttons
- Example: "Choose your login method"
Template Configuration¶
- Do not skip login page
- When enabled, always shows the login page even when only one identity provider is configured
- When disabled (default), users are redirected directly to the IdP if only one option exists
-
Use case: Enable if you need users to always see disclaimers or custom messaging
-
Select a template
- Choose from predefined HTML templates or create custom templates
- System templates: Marked with a red "System" tag; only super admins can edit
-
Actions:
- Create (+): Create a new HTML template
- Edit (pencil): Modify the current template (disabled for system templates unless you're a super admin)
- Preview (eye): Preview the template in a new window
-
Custom FooterLinks JSON
- Define footer links as a JSON array
- Format:
- Example use cases: Privacy policy, terms of service, support links
Security recommendation: Test login page changes in a non-production tenant first to avoid accidentally blocking user access.
Landing Page Tab¶
Purpose: Configure the post-authentication landing page users see after successful login.
Availability:
- May be restricted by global configuration
- Typical access: Tenant admins and/or super admins (configurable)
- The tab will be hidden if landing pages are globally disabled
Note: If you see an "Access Restricted" message when clicking this tab, landing page edits may be limited to super administrators only per global policy.
Landing Page Configuration¶
- Name* (required)
- Unique identifier for this landing page template
-
Read-only for system templates
-
Title
-
Page title displayed in browser tab and header
-
Is System Template?
- Toggle to mark this template as a system template
- Restriction: Requires super admin or
ADMIN_SCOPE.UPDATE_SYSTEM_TEMPLATES -
System templates can be shared across tenants
-
Custom FooterLinks JSON
- Same format as Login Page footer links
-
Allows users to navigate to documentation, dashboards, etc. after login
-
Template (HTML)
- Custom HTML for the landing page
- Monaco editor with syntax highlighting and validation
- Preview button: Opens a new window to preview the rendered page
- Best practice: Use semantic HTML and ensure mobile responsiveness
Use cases:
- Welcome messages for users
- Links to applications and resources
- Onboarding instructions
- Organizational announcements
Allowed Origins Tab¶
Purpose: Manage Cross-Origin Resource Sharing (CORS) allowed origins for your tenant.
Critical security feature: Only origins listed here can make authenticated API requests to the Auth service from browser-based applications.
Adding Allowed Origins¶
- Enter the full origin URL (scheme + host only, no path)
- Valid:
https://myapp.example.com -
Invalid:
https://myapp.example.com/path,myapp.example.com(missing scheme) -
Global checkbox (Super Admins Only):
- Mark origin as global (applies to all tenants)
-
Restriction: Only super administrators can create global origins
-
Click Add to save
Origin Validation Rules¶
The system enforces strict origin validation:
- Must include scheme (https:// or http://)
- Must not include path, query parameters, or hash fragments
- Must not include credentials (username:password@host)
- Must not have leading/trailing whitespace
- Must not duplicate existing origins
Managing Existing Origins¶
- View origins: Table displays all allowed origins for the tenant (includes tenant-specific and global origins)
- Delete origins: Click the delete icon to remove (config-defined origins cannot be deleted via UI)
- Global column: Indicates whether an origin is global or tenant-specific
Advanced Features (Super Admins Only)¶
- Allow-list Enabled toggle
- When disabled, CORS allow-list enforcement is bypassed (any origin allowed for non-public endpoints)
- Security warning: Only disable temporarily for troubleshooting
-
Default: Enabled
-
Discovery Mode toggle
- Logs all incoming origins to help identify what needs whitelisting
- Only works when allow-list is disabled
-
Use case: Transition from permissive to restrictive CORS policy
-
Refresh button: Clears the server-side CORS cache to apply changes immediately
Security Best Practices¶
- Only add origins you control and trust
- Use HTTPS origins (not HTTP) for production applications
- Avoid wildcards - list each origin explicitly
- Remove unused origins to minimize attack surface
- Monitor the Audit Log for origin changes (critical security event)
- Never disable allow-list enforcement in production unless absolutely necessary and time-limited
User Alert Settings Tab¶
Purpose: Configure which login events trigger user email notifications.
What you can configure:
- Select which login event types should generate email alerts to users
- Available event types include:
- Login success
- Login failure
- MFA challenge events
- Password reset events
- And other authentication-related events
Use cases:
- Alert users about suspicious login attempts
- Notify users of successful logins from new devices
- Compliance requirements for security event notifications
Best practice: Balance security notifications with alert fatigue; focus on high-risk events (failed logins, new device logins).
Email Settings Tab¶
Purpose: Configure SMTP settings for sending tenant-specific emails.
Availability: Tenant admin or super admin only (tab is hidden for non-admin users).
Note: The default tenant uses system-wide email settings and cannot be overridden.
Default vs. Custom Email Settings¶
- Use Default Email Settings toggle
- When enabled: Inherits email configuration from the default tenant
- When disabled: Allows custom SMTP configuration
- Recommendation: Use default settings unless you have specific requirements
Custom SMTP Configuration¶
Available when "Use Default Email Settings" is disabled:
- Host
- SMTP server hostname
-
Example:
smtp.example.com -
Port
- SMTP server port
-
Common: 587 (TLS), 465 (SSL), 25 (unencrypted - not recommended)
-
Secure
- Enable SSL/TLS connection
-
Recommendation: Always enable for production
-
Require TLS
- Enforce TLS for connection (STARTTLS)
-
Security recommendation: Enable in production environments
-
User
- SMTP authentication username
-
Must not contain whitespace
-
Password
- SMTP authentication password
- Must not contain whitespace
- Security note: Stored encrypted; never displayed after saving
Email Appearance¶
- From
- Sender email address for tenant emails
- Must be a valid email format
- Leave blank to use the default sender address
Testing Email Configuration¶
- Test Email Address
- Enter a valid email address to test your SMTP configuration
- Click Send Test Email to verify settings
- Success confirmation shown inline
Best practices:
- Test email settings after any changes
- Use a dedicated sending address (e.g.,
noreply@yourdomain.com) - Ensure SPF/DKIM records are configured for your sending domain to avoid spam filtering
Tenant SAML Certificates Tab¶
Purpose: Manage X.509 certificates used for SAML authentication.
What you can do:
- View certificates: See all uploaded X.509 certificates for your tenant
- Upload certificates: Add new certificates for SAML signing/encryption
- Set active certificate: Designate which certificate is currently in use
- Update friendly names: Label certificates for easy identification
- Delete unused certificates: Remove expired or unused certificates
Security requirements:
- Updating certificate names: Requires tenant admin or super admin
- Certificates are used to establish trust with SAML identity providers
Certificate lifecycle:
- Upload new certificate before the old one expires
- Test with new certificate
- Set new certificate as active
- Monitor for issues
- Remove old certificate only after confirming stability
Security best practices:
- Monitor certificate expiration (check Expiring Items dashboard)
- Rotate certificates before expiration (recommend 30-60 days before)
- Use strong key sizes (minimum 2048-bit RSA, prefer 4096-bit or ECC)
- Protect private keys - never share or expose them
Tenant JWKS Key Set Tab¶
Purpose: Manage JSON Web Key Sets (JWKS) used for JWT signing and verification.
What you can do:
- View current JWK: See the active JSON Web Key and any revoked keys
- Rotate JWK: Generate a new JWK while keeping the old one valid (smooth transition)
- Rotate and Revoke JWK: Generate a new JWK and immediately revoke the old one
- Revoke specific JWK: Revoke a key by its Key ID (kid)
Operations¶
- Rotate JWK (recommended)
- Generates a new key
- Previous key remains valid temporarily
- Allows zero-downtime key rotation
-
Use case: Regular key rotation schedule
-
Rotate and Revoke JWK (immediate revocation)
- Generates new key
- Immediately invalidates the old key
- All tokens signed with old key become invalid
-
Use case: Security incident or suspected key compromise
-
Revoke JWK (by kid)
- Revokes a specific key
- Use case: Targeted key invalidation
Security best practices:
- Rotate JWKs regularly (every 90-180 days for routine rotation)
- Use "Rotate" not "Rotate and Revoke" for scheduled rotations to avoid service disruption
- Document key rotation in audit trail
- Use "Rotate and Revoke" only for emergencies (key compromise, security incident)
- Monitor revoked keys list to ensure old keys are eventually cleaned up
Cookie Consent Banner Tab¶
Purpose: Configure GDPR/privacy-compliant cookie consent banners.
Compliance context: Required for GDPR, ePrivacy Directive, and similar privacy regulations.
Cookie Consent Configuration¶
- Enable Cookie Consent Message
- Shows/hides the cookie consent banner on login pages
-
Compliance note: Required for EU users and recommended globally
-
Cookie Consent Expiration (days)
- How long user consent is remembered
- Default: 150 days
-
After expiration, users must accept again
-
Cookie Consent Message
- Text displayed in the consent banner
- Supports rich text formatting (via Summernote editor)
- Default: "We use cookies to ensure that you have the best experience on our website. If you continue to use this site we assume that you accept this."
- Legal recommendation: Include link to privacy policy
Banner Styling¶
- Cookie Consent Banner Color
- Background: Banner background color (default:
#2B373B) - Text: Banner text color (default:
#FFFFFF) -
Live preview shows actual appearance
-
Cookie Consent Button Color
- Background: Accept button background (default:
#e7db08) - Text: Accept button text color (default:
#000000) -
Live preview shows button appearance
-
Cookie Consent Button Text
- Text on the accept button
- Default:
Accept - Keep short and clear (e.g., "Accept", "OK", "I Understand")
Best practices:
- Ensure text is readable - verify color contrast meets accessibility standards
- Keep message concise - users should understand quickly
- Include privacy policy link in the consent message
- Set appropriate expiration - balance user experience with regulatory requirements (typically 6-12 months)
Contacts Tab¶
Purpose: Manage contact information associated with the tenant.
Availability: View-only for regular users; editing requires tenant admin or super admin.
What you can do:
- Add contacts: Create new contact records for the tenant
- Assign contact types: Categorize contacts (e.g., technical contact, security contact, billing contact)
- Update contact details: Modify name, email, phone number
- Remove contacts: Delete obsolete contact records
Contact fields:
- Name: Contact person's full name
- Email: Contact email address (validated format)
- Phone Number: Contact phone number
- Contact Type: Role or purpose of this contact
Use cases:
- Emergency security contacts
- Technical escalation contacts
- Service notifications
- Compliance and auditing
Best practice: Keep contact information current; designate at least one technical and one security contact per tenant.
Security Recommendations¶
Critical Security Controls¶
- Always enable Admin MFA
- Protects against credential theft
-
Required for compliance in most frameworks
-
Use short session lifetimes
- Recommend: 1 hour maximum session, 20 minutes idle timeout
-
Shorter for high-security tenants
-
Restrict allowed origins
- Only add origins you control
- Use HTTPS (never HTTP in production)
-
Remove unused origins immediately
-
Monitor admin actions
- Review audit logs regularly for admin activity
-
Set up alerts for sensitive operations (certificate changes, admin group modifications)
-
Rotate cryptographic keys
- SAML certificates: Before expiration (30-60 days notice)
- JWKS: Every 90-180 days for routine rotation
-
Immediately upon suspected compromise
-
Use strong authentication
- Require MFA for admin accounts
- Use trusted identity providers (flagged as
isTrusted) - Avoid password-only authentication
Compliance Considerations¶
- Audit log retention: Configure based on compliance requirements (SOC 2, HIPAA, etc.)
- Cookie consent: Enable for GDPR/ePrivacy compliance
- Contact information: Maintain current contacts for incident response
- Session management: Configure based on data sensitivity and compliance frameworks
Regular Maintenance Tasks¶
Weekly:
- Review expiring items dashboard
- Check for unusual authentication patterns in login metrics
Monthly:
- Review and clean up unused allowed origins
- Verify contact information is current
- Review tenant admin membership
Quarterly:
- Audit admin access logs for suspicious activity
- Review and update security settings based on threat landscape
- Test disaster recovery procedures (certificate rotation, admin account recovery)
Annually:
- Review and update all branding and communications for accuracy
- Comprehensive security audit of tenant configuration
- Review and update cookie consent messaging for regulatory changes
Additional Resources¶
- Super Admin Access Reference:
packages/auth/docs/authorization/super-admin-access.md - Admin Roles Overview:
packages/auth/docs/authorization/admin-roles.md - Auth API Documentation: Available via Help > Auth API Documentation in the UI
Getting Help¶
If you encounter issues or need assistance:
- Check audit logs for error details
- Review the Usage Report to identify misconfigurations
- Contact your super administrator for elevated privilege requests
- Consult API documentation for advanced configurations
Document version: 1.0
Last updated: 2025-12-12
Target audience: Tenant Administrators